Zero trust, deception & disruption, change management Flashcards
Zero trust
You have to authenticate or prove yourself each time you want to gain access.
How can we start implementing zero trust?
Take our security devices & break them into smaller components.
Data plane
Part of device that processes frames, packets, network data.
Ex: switch, router firewall
Control plane
Manages actions occurring in the data plane, Configuring policies & rules.
Ex: routing tables, firewall rule, NAT tables
How do we control trust?
- Adaptive Identity
- Threat scope reduction
- Policy-driven access control
Adaptive identity
We want to look at the source of the requested resources.
Ex: physical location, IP address, relationship to org.
Threat scope reduction
decrease the # of possible entry points to get into the network
Policy-driven access control
Combines all the individual data points (adaptive identity) then decides what type of authentication to use
Another way to qualify identity of a person is through-
Security Zones, look at where they’re coming from and where they’re going.
**set rules on what zone has access to other zones
Policy enforcement point (gatekeeper)
§ Gathers all info about traffic, then provides it to PDP.
All of traffic that’s traversing through network must pass through PEP.
Policy decision point
responsible for examining the authentication
Policy engine
Evaluates each access decision based on policy.
Grant, deny, or revoke.
Policy administrator
○ Takes that decision and communicates w/ PEP
○ Generates access tokens or credentials
○ Tells the PEP to allow or disallow access
Honeypot
Attract attackers to system, & keep them involved to trap them there.
Creates a virtual world to explore.
Honeynets
A large deception network w. one or more honeypots.
Ex: servers, workstations, routers, switches